Searched refs:sockopt (Results 1 – 11 of 11) sorted by relevance
| /linux-6.15/tools/testing/selftests/net/ |
| H A D | cmsg_sender.c | 57 } sockopt; member 418 if (opt.sockopt.mark && in ca_set_sockopts() 420 &opt.sockopt.mark, sizeof(opt.sockopt.mark))) in ca_set_sockopts() 424 &opt.sockopt.priority, sizeof(opt.sockopt.priority))) in ca_set_sockopts() 428 if (opt.sockopt.tclass && in ca_set_sockopts() 430 &opt.sockopt.tclass, sizeof(opt.sockopt.tclass))) in ca_set_sockopts() 432 if (opt.sockopt.hlimit && in ca_set_sockopts() 434 &opt.sockopt.hlimit, sizeof(opt.sockopt.hlimit))) in ca_set_sockopts() 439 &opt.sockopt.dontfrag, sizeof(opt.sockopt.dontfrag))) in ca_set_sockopts() 443 &opt.sockopt.tclass, sizeof(opt.sockopt.tclass))) in ca_set_sockopts() [all …]
|
| H A D | rxtimestamp.c | 44 struct options sockopt; member 151 if (t->sockopt.so_timestamp) in print_test_case() 153 if (t->sockopt.so_timestampns) in print_test_case() 155 if (t->sockopt.so_timestamping) { in print_test_case() 158 if (t->sockopt.so_timestamping & sof_flags[f].mask) in print_test_case() 352 config_so_flags(rcv, test_cases[test_num].sockopt); in run_test_case()
|
| H A D | psock_fanout.c | 160 int sockopt; in sock_fanout_getopts() local 161 socklen_t sockopt_len = sizeof(sockopt); in sock_fanout_getopts() 164 &sockopt, &sockopt_len)) { in sock_fanout_getopts() 168 *typeflags = sockopt >> 16; in sock_fanout_getopts() 169 *group_id = sockopt & 0xfffff; in sock_fanout_getopts()
|
| /linux-6.15/tools/testing/selftests/net/packetdrill/ |
| H A D | tcp_nagle_sockopt_cork_nodelay.pkt | 2 // Test TCP_CORK and TCP_NODELAY sockopt behavior 14 // Set TCP_CORK sockopt to hold small packets 25 // Set TCP_CORK sockopt to hold small packets 31 // Set TCP_NODELAY sockopt should push pending bytes out 40 // Set TCP_NODELAY sockopt should push pending bytes out
|
| /linux-6.15/net/mptcp/ |
| H A D | Makefile | 5 mib.o pm_netlink.o sockopt.o pm_userspace.o fastopen.o sched.o \
|
| /linux-6.15/Documentation/bpf/ |
| H A D | prog_cgroup_sockopt.rst | 22 sockopt and it has writable context: it can modify the supplied arguments 44 sockopt. The BPF hook can observe ``optval``, ``optlen`` and ``retval``
|
| /linux-6.15/net/bridge/netfilter/ |
| H A D | Kconfig | 42 # old sockopt interface and eval loop
|
| /linux-6.15/net/ipv6/netfilter/ |
| H A D | Kconfig | 9 # old sockopt interface and eval loop
|
| /linux-6.15/net/ipv4/netfilter/ |
| H A D | Kconfig | 13 # old sockopt interface and eval loop
|
| /linux-6.15/Documentation/networking/ |
| H A D | rxrpc.rst | 535 A keyring is passed to the server socket by naming it in a sockopt. The server 821 the key bound to the socket with the RXRPC_SECURITY_KEY sockopt. Calls 1089 (#) Apply the RXRPC_MIN_SECURITY_LEVEL sockopt to a socket from within in the
|
| H A D | ip-sysctl.rst | 2982 sockopt. When it's unset, no SCTP_PEER_ADDR_CHANGE event with 2984 can be got via SCTP_GET_PEER_ADDR_INFO sockopt; When it's enabled, 2987 SCTP_GET_PEER_ADDR_INFO sockopt; When it's disabled, no 2990 sockopt.
|